Information Security Policy - Template
Information Security Policy - Template
Information Security Policy - Template
Note: Delete this and the next page once you complete the template.
● Builds staff awareness of their obligations in relation to selection, use and safety when utilising
information technology within the business.
● Is a proven way to help your managers and supervisors make consistent and reliable decisions.
● Helps give each employee a clear understanding as to what you expect and will allow.
It takes a little effort to complete, but brings long-term benefits, reduces risk, and clearly articulates staff
responsibilities in keeping organisational information safe.
This Information Security Policy template is made up of example topics. You can customise these if you
wish by adding or removing topics.
1. Guidance text appears throughout the document, marked by the word Guidance. Where you see a
guidance note, read and then delete it. Guidance has been added to help you complete the template
and should not appear in your final version.
2. Using MS Word's Replace function, search for [Organisation] and replace with your company name.
a. In Word's Home ribbon, open the Find and Replace tool, choose Replace. The Find and Replace
dialog opens with the Replace tab selected.
b. Enter [Organisation] in the Find what field.
c. Enter your company name in the Replace with field.
d. Click Replace All
Other tips
● To stop this policy manual sitting on a desk collecting dust, make it a living document. How?
Consider asking your staff to review it annually as part of their compliance activities.
● The writing style doesn’t need to be formal or long winded to be effective. Use simple sentences
and plain English to reduce the chance an IT user or manager will be confused about the intent of
your policy or the way to carry out a procedure.
Note: Delete this and the previous page once you complete the template.
Disclaimer
The information in this template is for general guidance only. The Digital Transformation Hub does not
make any representations or warranties (expressed or implied) as to the accuracy, currency or
authenticity of the information. The Digital Transformation Hub, its end users and agents do not accept
any liability to any person for the information or advice given in this document.
[Insert Company Logo Here]
4 Tier 2 controls 9
4.1 Identification controls
5 Policy governance 20
5.1 Roles and responsibilities
6 Appendices 22
6.1 Appendix A – Acronyms/ Definitions
Page 1 of 29
1 Introduction
Guidance: Edit this section in accordance with the needs of your organisation. Insert text about
introduction and purpose of this document.
“Information Security” refers to the processes and methodologies that [Organisation] has designed and
implemented to protect print, electronic, or any other form of confidential, private and sensitive information
or data (“information”) from unauthorised access, acquisition, modification, misuse, disclosure, disruption
or destruction. The purpose of this policy is to provide a security framework that will:
Page 2 of 29
2 Who this Policy applies to
Guidance: Edit this section in accordance with the needs of your organisation. Insert text about scope of
the document.
This policy applies to information assets owned or leased by [Organisation], and to devices that connect
to the [Organisation] network or reside at [Organisation] sites. This policy applies to all staff, directors,
contractors, temporary staff, consultants, volunteers and authorised agents of [Organisation].
For the purpose of this policy, the term ‘end user’ includes all groups who have access to [Organisation]
electronic resources.
The following mitigating controls are drawn from the Essential 8 Maturity Model developed by the
Australian Cyber Security Centre (ACSC), as well as the National Institute of Standards and Technology
(NIST) Cybersecurity Framework.
Governance requirements
Application, device operating system and network controls
Restrict administrative or privileged user access
Password management
Multi-factor authentication
Awareness and training
Regular backups
Incident response awareness.
Tier 2 is designed for organisations who may have some or all of the Tier 1 controls in place already and
are ready to apply additional controls based on their organisation’s appetite. These controls are based on
the NIST framework and its categories:
Identification controls
Information asset management
Information asset classification and handling
Information security risk management
Third party management.
Protective controls
Identity and access management
Physical security
Encryption
Remote access and WiFi
Systems development lifecycle (SDLC)
Patch management
Page 3 of 29
Configure Microsoft Office macro settings.
Detective controls
Security logging
Monitoring and review of security event logs
Automated log correlation
Threat intelligence
IDS/IPS (Intrusion Detection and Prevention Software)
Firewalls
Endpoint security monitoring
Vulnerability scanning and security testing.
Response and Recovery controls
Incident response planning
Disaster recovery planning
Business continuity planning.
It is vital to continue to prioritise cybersecurity once both of these tiers have been met.
Page 4 of 29
3 Tier 1 controls
Guidance: The Tier 1 Controls are predominantly aligned to the Australian Cyber Security Centre’s
(ACSC) Essential Eight. These contain the minimum baseline of cyber threat protection for organisations
to use in order to form their own cybersecurity framework and control guidelines.
Guidance: Cyber security practices must be driven and overseen by an organisation’s leadership for
continued effectiveness in operation and efficiency in resource use. Security policies and contract clauses
are governance mechanisms that are used to set expectations on security protections.
Cyber security discussions must occur at the executive level regularly. The nature of these
discussions should focus on the effectiveness of cyber security protections and additional
requirements based on risks faced, security incidents experienced and/or compliance obligations.
An end-user security policy must be developed and communicated to staff to outline expectations and
responsibilities in upholding the security of [Organisation’s] information and IT systems.
Key third party contracts must include requirements to keep [Organisation’s] information secure.
Guidance: It is also recommended to have a register of all the applications that can be patched
automatically along with those that require manual update (Refer to the IT Security Register Template for
reference).
Applications and operating systems in use at [Organisation] must be updated promptly when
vulnerabilities are rated as critical.
Automatic updates on all applications on devices that connect to the network must be enabled.
Where this is not possible, manual update processes must be in place.
Applications and operating systems that are no longer supported by the vendor must not be used.
User devices provided by [Organisation] must have antivirus software installed with appropriate
configurations such as scheduled scans and scanning files when these are accessed by users.
End users must not have permissions to modify the security settings of software (e.g., anti-virus)
running on computing equipment (except for approved devices and end-users).
When end users use their own devices (BYOD), the requirements from the End User Security policy
(4.6 Mobile Computing Devices) should be followed.
Devices that access sensitive information must have only approved software installed.
Insecure protocols which do not support multi-factor authentication (SMTP, IMAP etc) must be
disabled.
A firewall must be deployed at the network level to protect [Organisation’s] network from internet-
based threats.
An email filtering solution must be implemented to reduce spam and malware received via email.
Guidance: Please refer to the IT Security Register Template for more detailed information on the
Privileged user access (such as privileged users, type of privileges etc.)
End users must not maintain administrative privileges over devices that [Organisation] has supplied
for work purposes. While administrative privileges are sometimes required to perform actions on a
Page 5 of 29
device, these should only be provided to a very limited number of personnel (1 or 2). If an end user
requests access to administrative privileges on a device the following process for providing this
access should be used:
Confirmation of the certain task the end user needs to perform using administrative privileges.
A complex password must be set on the account, as this account now carries greater risk if it
were to be compromised.
The use of administrative privileges should be time bound and regularly validated. For example, a
user should only hold elevated privileges for the time they require them, post that, these should
be removed.
Privileged users at [Organisation] are also those end users who have access to information
considered sensitive (for example, client personal information). User access reviews of IT systems
holding sensitive information must be conducted on a regular basis (e.g., monthly, quarterly) to
identify user accounts that must be deprovisioned or have access levels adjusted.
Guidance: When specifying and implementing password requirements, it is important to note that long,
complex passwords are more secure than short, simple passwords.
Guidance: Multi-Factor Authentication (MFA) is one of the most important controls that an organisation
can use to prevent unauthorised access. When implemented, if a password is compromised, an attacker
will need access to the 2nd authentication factor (phone, email etc..) to gain access. There are many
options, but for MFA to be effective, each factor must come from a different category:
Page 6 of 29
1. Something you know: Password/PIN
2. Something you have: Phone/Email/Certificate
3. Something you are (biometrics): Facial recognition/Fingerprint
Multi-Factor authentication (MFA) must be used for IT systems/applications in use at [Organisation]
that are internet-facing and hold sensitive information.
Guidance: Training personnel and raising cyber-awareness is an essential part of any uplift in security.
Awareness is the start of an ongoing process, there must be recurring awareness training sessions and
attestation to the understanding of the points below.
All end users must develop an understanding of the following points:
Password usage and management - Creation, frequency of changes, secure storage, multi-factor
authentication (MFA).
Policy - Implications of non-compliance.
Emails - Attachments, links, phishing, spam, email list etiquette.
Web usage - Appropriate usage (e.g., work-related internet browsing, file and content sharing via
organisation approved platforms).
Social engineering - Shoulder surfing, phishing, unusual activity, password resets
Incident response - Roles, responsibilities and procedures (who to contact, what to do).
Personal use - Use of systems at work and at home.
Patching - Regular updates (e.g., timely update of patches when they are released by IT).
Access control concepts - Principle of least privilege, privileged access, separation of duties.
Desktop - Screensavers, locking unattended screens.
Existing staff must receive appropriate refresher training on an annual or more frequent basis.
Guidance: Creating a back-up process doesn’t need to be complex, it can be straightforward; such as
purchasing a secondary removal hard drive and transferring data to it periodically. Please refer to the IT
Security Register Template for more detailed information on the backup approach (frequency, retention,
type etc) for various information systems.
Regular backups of central information stores that are considered high value (i.e. if lost or
unrecoverable for an extended period of time, would impact on the operations of the organisation)
must be performed.
The backup must be stored in a different location to the original data that is backed up. (Guidance: An
example would be not to leave backup files on the device which they would normally be stored on)
Backups must be scheduled according to the availability and integrity requirements of the information
that is being backed up. A backup schedule must be documented and maintained for [Organisation]’s
critical information systems.
A simple data recovery test for important IT systems must be performed annually.
Guidance: Security incidents are adverse events that can impact on the confidentiality, integrity or
availability of information or IT systems. These can be of a cyber nature (i.e. linked to IT systems or
technology) or of a physical nature (e.g., physical document copies with confidential information are lost).
Edit this section in accordance with the needs of your organisation.
Page 7 of 29
Personnel at [Organisation] must be aware of the contact point at [Organisation] in the event of a
security incident.
[Organisation] must know who to contact externally to seek assistance, if required.
For example:
IT Support provider
The Australian Cyber Security Centre (ACSC) should be contacted to provide advice and
assistance.
Page 8 of 29
4 Tier 2 controls
Guidance: The intention of the Tier 2 controls is to equip an organisation with the ability to continuously
uplift its cybersecurity. There is an identified need for organisations to understand the threats,
vulnerabilities and loss exposure they face in order to make effective decisions about mitigating controls.
The NIST framework has been leveraged and its critical controls have been outlined in this document to
guide organisations on how they can best protect their information assets. These controls are segregated
into the five domains of the NIST framework to support the creation of a holistic and successful
cybersecurity plan. They are Identification controls, Protective controls, Detective controls and Response
and Recovery controls.
Page 9 of 29
Information security risk handling must align to [Organisation] Enterprise Risk Management model
following risk analysis, likelihood and consequence classification, and residual risk assessment.
Exemption requests must be documented, reviewed by IT/Security or other appropriate staff and risk
accepted by the accountable manager.
Compliance with Information security risk management must be assured via internal reviews/auditing
and/or external auditing.
4.1.4 Third party management
Third parties must contractually and operationally commit to meeting [Organisation]’s commercial,
security and regulatory compliance obligations. The following requirements must be included in third party
agreements:
Guidance: Edit this section in accordance with the needs of your organisation.
External parties are covered by a confidentiality agreement that explicitly states that persons with
access to [Organisation]’s facilities or proprietary information are not to disseminate any information
about [Organisation], its capabilities or activities without written authorisation.
The obligation of the third party to notify [Organisation] in cases of security incidents which may affect
[Organisation] (e.g., third party virus outbreak, successful third party network compromise etc).
The obligation of the third party to maintain confidentiality, integrity and availability of [Organisation]’s
information.
The possibility of renegotiating or terminating the contract if the terms and conditions are not satisfied,
for example an undisclosed security incident or third party failing to meet agreed service levels.
Subcontracting issues in case the third parties (e.g., Cloud Service Providers) make use of other
suppliers for the delivery of the services and these suppliers maintain direct or indirect access to
[Organisation]’s data. The third party must ensure that any suppliers they utilise to fulfil contract
requirements meet [Organisation]’s security and regulatory compliance obligations.
All outsourcing contracts must include an agreement on minimum required security control obligations
of the third party (e.g., penetration testing and vulnerability management processes for key IT
systems or applications).
Controls must be in place to ensure the security of remote connections between the parties. The third
party must utilise the existing [Organisation] security infrastructure and take responsibility for the
maintenance of the respective security controls that have been established by [Organisation].
The business continuity and disaster recovery arrangements for the resumption of the third party
services in case of service interruption or data loss/destruction. Each department must document and
inventory any contracted third parties and their services, along with the criticality of each third party
based on the risk assessment.
Page 10 of 29
4.2 Protective controls
User account ID and password are authenticated as a whole (i.e. at the same time) during the logon
process.
User access reviews should be conducted at least annually to verify that only legitimate, authorised
users have access to networks and IT systems, and a process should be established to remediate or
remove incorrect or excessive access.
A Joiner, Mover, Leaver policy must be defined and a process established to manage the
provisioning and deprovisioning of access across the user lifecycle.
User access requests for high risk applications, applications containing sensitive data, administrative
level access, or access outside of role scope should be approved by the [insert relevant job title here]
at [Organisation], prior to provisioning of access rights.
A Role Based Access Control (RBAC) framework should be used to determine user access and
permissions based on roles, and to establish a predefined set of access rights for users to inherit
based on their role.
User accounts must follow segregation of duties to separate authorisation, approval responsibilities
and prevent abuse of unauthorised privileges.
User accounts must only be used for their approved and intended purpose and for no other reason.
User accounts must have defined characteristics such as lockout duration for 15 minutes of idle time,
inactivity lockout in case of 3 months of inactivity and account lockout threshold if there are 5
consecutive invalid password attempts.
The use of personal email accounts or non-approved information technology resources for work-
related activities must be prevented. If these are to be used, they must be approved by
[insert relevant job title here].
4.2.2 Physical security
Assets must be physically protected to mitigate the following accidental or malicious risks:
Physical damage.
Natural, accidental or malicious causes.
Destruction of media, documents, or equipment.
Damage that can result in the need to repair or replace a device.
Theft or unauthorised access.
Inappropriate or lack of controls in place to protect physical assets (such as equipment,
removable media) and physical access to buildings.
Inadequate formal processes for asset and information destruction.
That can result in unauthorised disclosure of sensitive information, loss of control over a system
or malicious damage to systems and assets.
Guidance: Physical controls are varied and need to be implemented with the context of the organisation
and the physical needs of the asset in mind. Some examples of physical controls include:
Access to the facility must be controlled through (keys/swipe cards) ingress (entry) and egress (exit)
points and the verification of access authorisations.
Page 11 of 29
All lost keys must be reported immediately to the appropriate team and access revoked immediately.
Sensitive areas (server room, cabling) must be secured (lock door) from public access and access
logs must be maintained.
Visitor access must be restricted, monitored and escorted.
Secure key & combination storage (safe).
Regular (annual) physical asset inventories are reviewed and signed off.
Change keys (when lost) and combinations when compromised or personnel leave.
Visitor access to organisation premises or information processing facilities is formally logged and
maintained.
Keep a record of all asset destructions and destruction certificates.
4.2.3 Encryption
Portable or laptop computers must be configured for full disk encryption (e.g., Bitlocker) to protect
[Organisation]’s information assets. On organisational devices, the end user’s pin will only be known
by the user. A master key should allow for emergency decryption by IT service staff.
Disk encryption deployed on portable computers must be centrally managed and configured such that
a system administrator is able to recover encrypted information without an end user’s intervention.
Sensitive information (based on information classification levels) must be encrypted at rest and in
transit.
[Organisation]’s system development process must include formal security checkpoints throughout its
lifecycle:
Phase 1: Plan
Phase 2: Procure
Phase 3: Build
Phase 4: Implement
Page 12 of 29
Phase 5: Test.
Development teams, which utilise both traditional and agile development methods, must formally address
the security requirements. In addition to the requirements outlined in this document, all projects involving
application/infrastructure development or acquisition must adhere to all [Organisation]’s policies.
Only specific Microsoft Office applications for which there is a demonstrated business requirement for
macro use should be allowed to execute approved macros from trusted locations or macros that are
digitally signed by trusted publishers. All other Microsoft Office applications should have support for
macros disabled.
If Organisations/users do not see a need for using macros, support should be disabled for it across
the Microsoft Office suite. (Guidance: These can be performed by applying macro security controls
using group policy settings and also by disabling support for trusted documents and trusted
locations).
Page 13 of 29
4.3 Detective controls
Guidance: Detective controls are required in the event where protective controls have been bypassed due
to the nature of the threat landscape. Edit this section in accordance with the needs, affordability and
complexity of your organisation.
[Organisation] should identify undesirable security scenarios and its indicators so automated rules
can be implemented to correlate disparate logs and alerts in the event the scenarios occur.
[Guidance: Log correlation and alerting is often achieved through a Security Information and Event
Management (SIEM) solution].
When an alert is triggered, this should start the Incident Response process, to triage, contain,
eradicate, and recover from the incident.
External threat intelligence can be obtained from a number of organisations, for example ASIO, ASD,
AusCERT and global sources from open-source threat intelligence. Intelligence must be considered
in the context of [Organisation]’s IT environment and should be used in assessing the adequacy and
effectiveness of the security controls in operation and in identifying new information security control
requirements.
Page 14 of 29
4.3.5 IDS/IPS (Intrusion Detection and Prevention Software)
An intrusion detection capability or any other advanced protection mechanisms (e.g., web filtering), if
provided by anti-malware software installed on endpoints and servers,or provided by routers or other
network devices, must be enabled.
4.3.6 Firewalls
[Organisation] must have network edge, and device-based firewalls enabled. [Guidance: The specific
product may vary from time to time, depending on the requirement.] As a minimum the firewall must:
Be the operating system built-in firewall, a firewall provided with the protection endpoint agent, or
a dedicated network appliance.
Be one of the standard products supported by the organisation (the organisation should pick a
preferred product for each category).
Be configured to be enabled when the device is on AND off the internal network.
Network firewalls must be managed by [Organisation] or the contracted IT service provider.
Management tasks include appropriate configuration and firewall rule management to provide
protection from potential internal and external attacks.
Page 15 of 29
4.4 Response and Recovery Controls
Page 16 of 29
Other IR teams.
Internet Service Providers.
Incident Reporters.
Law Enforcement.
Software & Support Vendors.
Roadmap for continued IR capability uplift
Comprehensive and regularly updated, standard operating procedures for likely cyber threats such
as:
Ransomware.
Distributed Denial of Service.
Business Email Compromise.
Lessons Learned discussion.
Security reporting
Security breaches occur when the confidentiality, integrity or availability of information has been
compromised. Prompt reporting of security breaches results in risk mitigation.
For the purpose of reporting, there are 3 categories of Security Breach. If you are unsure how to
categorise your breach, contact [NAME/S].
Near miss, where a security breach has not occurred and reporting suspicious activity allows for the
prevention of a breach, including but not limited to:
Phishing emails, with no user interaction (clicking links, replying to email).
Suspicious people around the premises, or making enquiries.
Unusual activity on the network perimeter.
Publicly available information that could lead to exploitation.
Violations of Information Security Policy/Applicable Standards.
In the event of a near miss, report the incident to [NAME/S].
Security breach, where a security incident has occurred, but data has not been stolen or unauthorised
disclosure has not occurred, including but not limited to:
Suspicious requests to change account details.
Malware.
Unauthorised change to details/settings/data.
Loss of encrypted devices.
Breach of physical security.
Unusual network activity.
Violations of Information Security Policy/Applicable Standards.
In the event of a security breach, report the incident to [NAME/S].
Data breach, a security incident where unauthorised access to information resulted in theft or
unauthorised disclosure, including but not limited to:
Data Breach.
Malware.
Loss of unencrypted devices.
Breach of physical security.
Page 17 of 29
Unauthorised change to details/settings/data (this could be a security breach).
Violations of Information Security Policy/Applicable Standards.
In the event of a data breach, report the incident to [NAME/S].
Page 18 of 29
4.4.4 Cyber insurance
[Organisation] must assess insurance options on an annual basis for appropriateness of cyber
insurance cover that may be required based upon organisational requirements.
Page 19 of 29
5 Policy governance
Guidance: Edit this section in accordance with the needs of your organisation.
Roles and responsibilities relating to cybersecurity must be clearly defined and documented including
internal and external decision-making capabilities, functions, and roles, and IT activities performed by
third-parties.
Roles and responsibilities must be appropriately segregated based on required duties, to prevent
fraud and intentional or unintentional misuse of the IT environment.
The control exception process allows departments (where technological or operational constraints or
a legitimate organisational requirement exists) to request an exception from a defined control within
this Policy. Exemption requests must be reviewed and assessed by the [insert relevant job title here]
and approved by the [insert relevant job title here]. All control exemptions must be documented with a
rationale and reported to the [insert relevant committee/title here]. Control exemptions are to be
reviewed on a periodic basis.
The Policy document must be reviewed on an [Organisation to define the frequency of review (e.g.,
annual basis)] basis and updated if required, to ensure it remains up-to-date and continues to meet the
requirements of [Organisation].
In addition to the annual review cycle, the Policy must be able to evolve in order to meet changing internal
and external requirements, which may include:
Unless otherwise noted, this policy is effective from the date of approval.
Page 20 of 29
This policy has been approved and endorsed by:
Document details
Name of document [Insert approved name of this Policy]
Version [Insert current version]
Author [Insert Name and title of the person who prepared this policy]
Reviewed By [Insert Name and title of the person who reviewed this policy]
Approved By [Insert Name and title of the approver of this policy]
Date of Approval [Insert Date Month Year]
Date of Effect [Insert Date Month Year]
Assigned Review Period [12 Months]
Date of Next Review [Insert Date Month Year]
This policy is due for review by the date shown above, after which it may become invalid. Policy users
should ensure that they are consulting the current, valid version of the document.
Guidance: Edit this section in accordance with the needs of your organisation.
Page 21 of 29
6 Appendices
Guidance: Edit this section in accordance with the needs of your organisation.
Page 22 of 29
information.
Mobile Device: A portable computing or communications device. For example, smartphones, tablets
and laptops.
Multi-factor authentication (MFA): A method of computer access control in which a user is granted
access only after successfully presenting several separate pieces of evidence to an authentication
mechanism – typically at least two of the following categories: knowledge (something they know),
possession (something they have), and inherence (something they are).
Network Device: ICT equipment designed to facilitate the communication of data. For example,
routers, switches and wireless access points.
Patch: A piece of software designed to remedy security vulnerabilities, or improve the usability or
performance of software and ICT equipment.
Personal information: Information or an opinion about an identified individual, or an individual who is
reasonably identifiable: whether the information or opinion is true or not; and whether the information or
opinion is recorded in a material form or not.
Personally identifiable information (PII): Information that can be used on its own or with other
information to identify, contact or locate a single person, or to identify an individual in context.
Privileged Account: An 'Administrative' or 'Super User' account with higher access privileges (powerful
functionalities greater than those of normal user accounts). Privileged accounts are usually assigned
system administrators.
Public (information classification): Information intended for public use where public use and
disclosure would not negatively impact [organisation] (e.g., Marketing brochures and promotional
material, online website content, job advertisements).
Remote Access: Access to a system that originates from outside an organisation’s network and enters
the network through a gateway, including over the internet.
Security Incident: An act or event that violates information security policies, controls, standards or
relevant local laws and regulations. Security incidents can be triggered by a single event such as a virus
outbreak or network breach. Often, security incidents are a combination of several seemingly innocuous
events which if not identified, contained and eradicated in a timely manner, can lead to larger events
that pose greater risk to an entire organisation.
Sensitive (information classification): Sensitive information subject to a need-to-know basis for
certain individuals or groups. Access is typically approved by [organisation] senior management.
Unauthorised disclosure may cause severe financial or reputational damage to [organisation]. For
example, sensitive information about or belonging to customers or staff (e.g., date of birth, credit card
details or health information).
Third Party Supplier: An organisation or person that is not a member of the [organisation] network,
(partners, employees of that organisation), that provides products and/or services to the [Organisation].
NIST: National Institute of Standards and Technology.
Vulnerability: A weakness in system security requirements, design, implementation or operation that
could be exploited.
Page 23 of 29
6.2 Appendix B – Implementation guidance
Page 24 of 29
search#!/controls?version=4.0&family=PE
9.2 https://csrc.nist.rip/publications/nistpubs/800-12/800-12-html/ NIST
chapter15.html
10 Risk Assessment
10.1 https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800- NIST
30r1.pdf
11 NIST Risk Management Framework (Tier 2 Controls)
11.1 https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release- NIST
search#!/800-53
11.2 https://csrc.nist.gov/projects/ransomware-protection-and-response NIST
11.3 https://www.nist.gov/blogs/taking-measure/protecting-businesses-and- NIST
consumers-email-scams
12 Password Management
12.1 https://docs.microsoft.com/en-us/microsoft-365/admin/misc/password- Microsoft
policy-recommendations?view=o365-worldwide
12.2 https://pages.nist.gov/800-63-3/sp800-63b.html#:~:text=Verifiers NIST
%20SHOULD%20NOT%20 require%20memorized%20 secrets%20to
%20be%20changed%20arbitrarily%20(e.g.%2C%20periodically).%20
However%2C%20 verifiers%20CALL%20for%20a%20change%20 if
%20there%20is%20 evidence%20of%20 compromise%20of%20the%20
authenticator.
Page 25 of 29